Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec cover image

Defensive Security Podcast Episode 259

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

00:00

Is There a Way to Train the Tokens?

It's going to require a kind of a multi moltet layred approachedone, certainly training. But in the reality is the least the past o least resistance, is to include the tokens in source code. So it's almost like hard coating a usning password, nor absolutely, absolutely so. It's on lookedat because people don't feel like a token is re us name password correct? Exactly.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app